Presentation: The Most Secure Program Is One That Doesn’t Exist
Share this on:
What You’ll Learn
-
Understand what safeties Rust offers and how it can save you from making common mistakes.
-
Hear about case studies of libraries implemented in Rust and what was found.
-
Learn examples of what Rust can and cannot do
Abstract
Rust is a programming language that started with the explicit goal of preventing segfaults and guaranteeing thread safety to create a fearlessly concurrent systems language. The compiler enforces type- and memory- safety to achieve this. There’s a significant overlap between critical security bugs and memory vulnerabilities, so code written in Rust is more secure. But that’s only half the story. Can a language mitigate side-channel attacks? How can we integrate formal methods to prove implementation correctness? This talk will give an overview of how Rust’s design gives security guarantees and discuss goals and visions for the future.
QCon: What’s the focus of the work you do today?
Diane: I am the security and privacy lead on the mixed reality team. The focus of my work is building a browser that provides a secure, immersive web experience. I also work very closely with the Rust team. I lead the formal verification effort which is determining how we leverage the unique properties of Rust to allow people to use formal verification tools and techniques in their app code.
It's in the early stages but there are some aspects of Rust (namely that it is strongly influenced by functional programming languages) that I believe make it very promising. I also work with the unsafe code guidelines group.
QCon: What's the motivation for your talk?
Diane: I once implemented an unsafe trait that I never should have been implementing. It was caught in review, and that really was the inspiration for the talk.
QCon: What topics are you going to cover?
Diane: I’m going to start out by giving you overview of what guarantees Rust offers and what that actually means. What is memory safety? How do we do it? Then I’ll go into discussing a case study with specific code examples.
After talking about the guarantees results of this study, which is an example of taking a component of a very large C code base and swapping it out for a Rust component. That's the strength of Rust; as engineers, we want to build things modularly. We don't want to have to rewrite everything from scratch every time we decide that to go a new route with a language for whatever reason. Because of the zero-cost abstraction, the idea is you can call back and forth between languages like C without an amortized performance cost. It just looks like C. That’s very powerful tool for modernizing projects.
What I'm planning to do with this talk is help people understand what Rust does and doesn't do. Sometimes people think that Rust is memory safe and everything should be in Rust. Well, maybe not. For example, coming from a security background, all of our main cryptographic libraries are written in C and C++ with generally hand optimized assembly and when you are re-implementing normal code and you introduce a logic error, it will cause something to not work quite right. That's a problem. But if memory safety is not an issue then you generally don't have to worry about things like remote code execution.
QCon: Who is the target audience for your talk?
Diane: The target audience is anyone unfamiliar with the guarantees provided by Rust or people who are looking for a refresher. A lot of it is going to be geared towards people who are more familiar with systems programming.
Similar Talks
Tracks
Monday, 5 November
-
Microservices / Serverless Patterns & Practices
Evolving, observing, persisting, and building modern microservices
-
Practices of DevOps & Lean Thinking
Practical approaches using DevOps & Lean Thinking
-
JavaScript & Web Tech
Beyond JavaScript in the Browser. Exploring WebAssembly, Electron, & Modern Frameworks
-
Modern CS in the Real World
Thoughts pushing software forward, including consensus, CRDT's, formal methods, & probabilistic programming
-
Modern Operating Systems
Applied, practical, & real-world deep-dive into industry adoption of OS, containers and virtualization, including Linux on Windows, LinuxKit, and Unikernels
-
Optimizing You: Human Skills for Individuals
Better teams start with a better self. Learn practical skills for IC
Tuesday, 6 November
-
Architectures You've Always Wondered About
Next-gen architectures from the most admired companies in software, such as Netflix, Google, Facebook, Twitter, & more
-
21st Century Languages
Lessons learned from languages like Rust, Go-lang, Swift, Kotlin, and more.
-
Emerging Trends in Data Engineering
Showcasing DataEng tech and highlighting the strengths of each in real-world applications.
-
Bare Knuckle Performance
Killing latency and getting the most out of your hardware
-
Socially Conscious Software
Building socially responsible software that protects users privacy & safety
-
Delivering on the Promise of Containers
Runtime containers, libraries, and services that power microservices
Wednesday, 7 November
-
Applied AI & Machine Learning
Applied machine learning lessons for SWEs, including tech around TensorFlow, TPUs, Keras, PyTorch, & more
-
Production Readiness: Building Resilient Systems
More than just building software, building deployable production ready software
-
Developer Experience: Level up your Engineering Effectiveness
Improving the end to end developer experience - design, dev, test, deploy, operate/understand.
-
Security: Lessons Attacking & Defending
Security from the defender's AND the attacker's point of view
-
Future of Human Computer Interaction
IoT, voice, mobile: Interfaces pushing the boundary of what we consider to be the interface
-
Enterprise Languages
Workhorse languages found in modern enterprises. Expect Java, .NET, & Node in this track